Difference between revisions of "TailScale"
Jump to navigation
Jump to search
Line 41: | Line 41: | ||
Then, in your NAT settings, '''Firewall / NAT / Port Forward''', When you create a NAT forward that uses TailScale, select the '''Tailscale''' interface & '''Any''' as the destination. This will allow you to treat the TailScale IP address just like you would normally treat the WAN address. | Then, in your NAT settings, '''Firewall / NAT / Port Forward''', When you create a NAT forward that uses TailScale, select the '''Tailscale''' interface & '''Any''' as the destination. This will allow you to treat the TailScale IP address just like you would normally treat the WAN address. | ||
In theory, [https://tailscale.com/kb/1019/subnets/ this page] is relevant... | |||
Research required. | |||
= HeadScale = | = HeadScale = |
Revision as of 01:36, 9 March 2023
11 (bullseye) |
|
WIP!!! As always...
Start with:
sudo apt update
sudo apt upgrade
TailScale HowTo
- Tailscale quickstart (Get individual machines onto your private TailScale network)
TailScale & pfSense
- A Tailscale Package for pfSense! (video)
- exit node
- subnet router
- 6:20 - configuration
- 7:30 - mention of headscale
- 16:15 - Subnets
- 19:30 - Firewall rules
- 20:32 - routing limitations
- 27:30 - Outbound NAT
- How to Set Up Tailscale on pfSense
Inbound NAT
For some reason, nobody talks about how to use TailScale to actually access your pfSense managed network from the OUTSIDE.
What I've figured out so far...
Assign the TailScale interface:
Interfaces / Assignments & click "Add" beside "tailscale0 (tailscale0)".
Then, in your NAT settings, Firewall / NAT / Port Forward, When you create a NAT forward that uses TailScale, select the Tailscale interface & Any as the destination. This will allow you to treat the TailScale IP address just like you would normally treat the WAN address.
In theory, this page is relevant...
Research required.